-
1
-
-
74049088125
-
TruWallet: Trustworthy and migratable wallet-based web authentication
-
ACM, New York
-
Gajek, S., Löhr, H., Sadeghi, A.R., Winandy, M.: TruWallet: trustworthy and migratable wallet-based web authentication. In: STC 2009: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing, pp. 19-28. ACM, New York (2009)
-
(2009)
STC 2009: Proceedings of the 2009 ACM Workshop on Scalable Trusted Computing
, pp. 19-28
-
-
Gajek, S.1
Löhr, H.2
Sadeghi, A.R.3
Winandy, M.4
-
2
-
-
34548150723
-
Compartmented security for browsers - Or how to thwart a phisher with trusted computing
-
IEEE Computer Society, Los Alamitos
-
Gajek, S., Sadeghi, A.R., Stüble, C., Winandy, M.: Compartmented security for browsers - or how to thwart a phisher with trusted computing. In: 2nd International Conference on Availability, Reliability and Security (ARES 2007), pp. 120-127. IEEE Computer Society, Los Alamitos (2007)
-
(2007)
2nd International Conference on Availability, Reliability and Security (ARES 2007)
, pp. 120-127
-
-
Gajek, S.1
Sadeghi, A.R.2
Stüble, C.3
Winandy, M.4
-
4
-
-
39049092821
-
Delegate: A proxy based architecture for secure website access from an untrusted machine
-
IEEE Computer Society, Los Alamitos
-
Jammalamadaka, R.C., van der Horst, T.W., Mehrotra, S., Seamons, K.E., Venkasubramanian, N.: Delegate: A proxy based architecture for secure website access from an untrusted machine. In: 22nd Annual Computer Security Applications Conference (ACSAC 2006), pp. 57-66. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
22nd Annual Computer Security Applications Conference (ACSAC 2006)
, pp. 57-66
-
-
Jammalamadaka, R.C.1
Van Der Horst, T.W.2
Mehrotra, S.3
Seamons, K.E.4
Venkasubramanian, N.5
-
5
-
-
37149008159
-
Practical uses of virtual machines for protection of sensitive user data
-
Information Security Practice and Experience - Third International Conference, ISPEC 2007, Proceedings
-
Kwan, P.C.S., Durfee, G.: Practical uses of virtual machines for protection of sensitive user data. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 145-161. Springer, Heidelberg (2007) (Pubitemid 350259423)
-
(2007)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4464 LNCS
, pp. 145-161
-
-
Kwan, P.C.S.1
Durfee, G.2
-
6
-
-
77954719036
-
Towards a trusted mobile desktop
-
Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. Springer, Heidelberg
-
Selhorst, M., Stüble, C., Feldmann, F., Gnaida, U.: Towards a trusted mobile desktop. In: Acquisti, A., Smith, S.W., Sadeghi, A.-R. (eds.) TRUST 2010. LNCS, vol. 6101, pp. 78-94. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6101
, pp. 78-94
-
-
Selhorst, M.1
Stüble, C.2
Feldmann, F.3
Gnaida, U.4
-
7
-
-
74049088382
-
On-board credentials with open provisioning
-
ACM, New York
-
Kostiainen, K., Ekberg, J.E., Asokan, N., Rantala, A.: On-board credentials with open provisioning. In: Proc. of the 4th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2009). ACM, New York (2009)
-
(2009)
Proc. of the 4th ACM Symposium on Information, Computer, and Communications Security (ASIACCS 2009)
-
-
Kostiainen, K.1
Ekberg, J.E.2
Asokan, N.3
Rantala, A.4
-
9
-
-
51849104627
-
TrustZone: Integrated hardware and software security
-
Alves, T., Felton, D.: TrustZone: Integrated hardware and software security. Information Quaterly 3 (2004)
-
(2004)
Information Quaterly
, vol.3
-
-
Alves, T.1
Felton, D.2
-
10
-
-
80755188558
-
-
Heise Security
-
Heise Security: Hacker extracts crypto key from TPM chip (2010), http://www.h-online.com/security/news/item/ Hacker-extracts-crypto-key-from-TPM- chip-927077.html
-
(2010)
Hacker Extracts Crypto Key from TPM Chip
-
-
-
11
-
-
84891128357
-
Transaction generators: Root kits for web
-
USENIX Association
-
Jackson, C., Boneh, D., Mitchell, J.: Transaction generators: Root kits for web. In: 2nd USENIX Workshop on Hot Topics in Security (HotSec 2007), pp. 1-4. USENIX Association (2007)
-
(2007)
2nd USENIX Workshop on Hot Topics in Security (HotSec 2007)
, pp. 1-4
-
-
Jackson, C.1
Boneh, D.2
Mitchell, J.3
-
15
-
-
84958776015
-
Personal secure booting
-
Varadharajan, V., Mu, Y. (eds.) ACISP 2001. Springer, Heidelberg
-
Itoi, N., Arbaugh, W.A., Pollack, S.J., Reeves, D.M.: Personal secure booting. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol. 2119, pp. 130-144. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2119
, pp. 130-144
-
-
Itoi, N.1
Arbaugh, W.A.2
Pollack, S.J.3
Reeves, D.M.4
-
16
-
-
33847753565
-
-
Network Working Group: version 1.2. Standards track
-
Network Working Group: The transport layer security (TLS) protocol. version 1.2. Standards track (2008), http://tools.ietf.org/html/rfc5246
-
(2008)
The Transport Layer Security (TLS) Protocol
-
-
-
17
-
-
34250786200
-
Web Wallet: Preventing Phishing Attacks by Revealing User Intentions
-
ACM, New York
-
Wu, M., Miller, R.C., Little, G.: Web Wallet: Preventing Phishing Attacks by Revealing User Intentions. In: 2nd Symposium on Usable Privacy and Security (SOUPS 2006), pp. 102-113. ACM, New York (2006)
-
(2006)
2nd Symposium on Usable Privacy and Security (SOUPS 2006)
, pp. 102-113
-
-
Wu, M.1
Miller, R.C.2
Little, G.3
-
18
-
-
82055170779
-
-
Project website
-
Maemo: Project website (2010), http://maemo.org
-
(2010)
-
-
-
19
-
-
82055198304
-
-
Project website
-
Paros: Project website (2010), http://www.parosproxy.org
-
(2010)
-
-
-
20
-
-
34548150723
-
Compartmented security for browsers - Or how to thwart a phisher with trusted computing
-
IEEE Computer Society, Washington, DC, USA
-
Gajek, S., Sadeghi, A.R., Stuble, C., Winandy, M.: Compartmented security for browsers - or how to thwart a phisher with trusted computing. In: ARES 2007: Proceedings of the The Second International Conference on Availability, Reliability and Security, pp. 120-127. IEEE Computer Society, Washington, DC, USA (2007)
-
(2007)
ARES 2007: Proceedings of the the Second International Conference on Availability, Reliability and Security
, pp. 120-127
-
-
Gajek, S.1
Sadeghi, A.R.2
Stuble, C.3
Winandy, M.4
-
21
-
-
34548786769
-
The emperor's new security indicators
-
IEEE Computer Society, Washington, DC, USA
-
Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The emperor's new security indicators. In: SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy, pp. 51-65. IEEE Computer Society, Washington, DC, USA (2007)
-
(2007)
SP 2007: Proceedings of the 2007 IEEE Symposium on Security and Privacy
, pp. 51-65
-
-
Schechter, S.E.1
Dhamija, R.2
Ozment, A.3
Fischer, I.4
-
22
-
-
85084162914
-
Copilot - A coprocessor-based kernel runtime integrity monitor
-
Petroni Jr., N.L., Fraser, T., Molina, J., Arbaugh, W.A.: Copilot - a coprocessor-based kernel runtime integrity monitor. In: Proceedings of the 13th USENIX Security Symposium, USENIX, pp. 179-194 (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium, USENIX
, pp. 179-194
-
-
Petroni Jr., N.L.1
Fraser, T.2
Molina, J.3
Arbaugh, W.A.4
-
23
-
-
70350637699
-
Measuring semantic integrity for remote attestation
-
Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. Springer, Heidelberg
-
Baiardi, F., Cilea, D., Sgandurra, D., Ceccarelli, F.: Measuring semantic integrity for remote attestation. In: Chen, L., Mitchell, C.J., Martin, A. (eds.) Trust 2009. LNCS, vol. 5471, pp. 81-100. Springer, Heidelberg (2009)
-
(2009)
LNCS
, vol.5471
, pp. 81-100
-
-
Baiardi, F.1
Cilea, D.2
Sgandurra, D.3
Ceccarelli, F.4
-
24
-
-
77952371831
-
-
Trusted Computing Group: Version 1.2 rev. 103
-
Trusted Computing Group: TPM Main Specification, Version 1.2 rev. 103 (2007)
-
(2007)
TPM Main Specification
-
-
-
26
-
-
0030261758
-
Strong password-only authenticated key exchange
-
Jablon, D.P.: Strong password-only authenticated key exchange. Computer Communication Review 26, 5-26 (1996)
-
(1996)
Computer Communication Review
, vol.26
, pp. 5-26
-
-
Jablon, D.P.1
-
28
-
-
70449757567
-
-
Taylor, D., Wu, T., Mavrogiannopoulos, N., Perrin, T.: RFC5054: Using the secure remote password (SRP) protocol for TLS authentication (2007), http://www.ietf.org/rfc/rfc5054
-
(2007)
RFC5054: Using the Secure Remote Password (SRP) Protocol for TLS Authentication
-
-
Taylor, D.1
Wu, T.2
Mavrogiannopoulos, N.3
Perrin, T.4
|